Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions Webcast On Demand: Top 10 Reasons to Protect Your Agency with CipherTrust Data Security Platform

web-tn-ciphertrust-migration-webinar

In this installment of Thales TCT’s CTO Sessions Webcast Series, our Deputy CTO shared the Top 10 Reasons to Protect your Agency with CipherTrus...

Read More

CTO Sessions Webcast On Demand: Taking Control of 2023’s Top Tech Trends

web-tn- tech-trends-webinar

On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s CTO Office shared predictions on the top 5 tech trends for...

Read More

CTO Sessions On Demand: Protecting Your Data in Their Cloud

web-tn-cloud-webinar

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

CTO Sessions On Demand: Are You Quantum Ready?

web-tn-csft-quantum-webinar

Despite large-scale quantum computing being several years away from being a practical reality, federal government experts are deservedly concerned abo...

Read More

CTO Sessions On Demand: Data Protection at the Edge

web-tn-edge-webinar-social

Core computing functionality, commonly found in data centers and in the cloud, is also being deployed at the edge — data protection capabilities must ...

Read More

Cyber EO Compliance Video Series – Part 3 – Data at Rest Encryption

Thales TCT Video (1)

Part 3 of this video series, based on a recent Thales TCT webinar, discusses Section 3.d of the Executive Order which requires the implementation of e...

Read More

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

web-tn-teradata

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, services, and results. However, Teradata...

Read More

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

web-tn-sypplychain

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply chain attacks have increased 78%. By infiltrating a supply c...

Read More

On Demand Webinar: Best Practices for Data Visibility

web-tn-data-visibiity

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what se...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

web-tn-cloud-dp

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More